Acquisition Hour: Export Controls – ITAR and Associated Requirements
This is Part 2 of a six part Acquisition Hour: Cyber Security series. Imagine giving away part of your war fighting equipment to your enemy and then fighting a war against your tanks, your planes, enemy combatants using your encryption and even your night vision goggles; essentially fights a war without any technical advantage. Alternatively, […]